You are on page 1of 43

Chapter 3:

Using Maintenance &


Troubleshooting Tools
and Applications

CCNP TSHOOT: Maintaining and Troubleshooting IP Networks

Course v6 Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 1
Chapter 3 Objectives
▪ Utiliser les commandes Cisco IOS pour recueillir
des informations à l’appui du processus de
diagnostics.

▪ Identifier les outils utilisés pour l’entretien


spécifique et des processus de dépannage.

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 2
Utiliser les
commandes Cisco
IOS pour recueillir
des informations

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 3
Collecte et filtrage d’informations en utilisant
les commandes IOS SHOW
Filtering show ip route command output

R1# show ip route 10.1.193.2


Routing entry for 10.1.193.0/30
Known via "connected", distance 0, metric 0 (connected, via
interface)
Redistributing via eigrp 1
Routing Descriptor Blocks:
* directly connected, via Serial0/0/1
Route metric is 0, traffic share count is 1

R1# show ip route 10.1.193.10


% subnet not in table

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 4
Collecte et filtrage d’informations en utilisant
les commandes IOS SHOW
Using show ip route with network addresses

R1# show ip route


< output omitted >

192.168.1.0/30 is subnetted, 1 subnets


C 192.168.1.0 is directly connected, Loopback0

R1# show ip route 192.168.1.0


Routing entry for 192.168.1.0/30, 1 known subnets
Attached (1 connections)

C 192.168.1.0 is directly connected, Loopback0

R1# show ip route 192.168.1.0 255.255.255.252


Routing entry for 192.168.1.0/30
Known via "connected", distance 0, metric 0 (connected, via interface)
Routing Descriptor Blocks:
* directly connected, via Loopback0
Route metric is 0, traffic share count is 1

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 5
Collecte et filtrage d’informations en utilisant
les commandes IOS SHOW
Using the longer-prefixes keyword with show ip route

R1# show ip route 10.1.193.0 255.255.255.0 longer-prefixes


< output omitted >
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 46 subnets, 6 masks
C 10.1.193.2/32 is directly connected, Serial0/0/1
C 10.1.193.0/30 is directly connected, Serial0/0/1
D 10.1.193.6/32 [90/20517120] via 10.1.192.9, 2d01h, FastEthernet0/1
[90/20517120] via 10.1.192.1, 2d01h, FastEthernet0/0
D 10.1.193.4/30 [90/20517120] via 10.1.192.9, 2d01h, FastEthernet0/1
[90/20517120] via 10.1.192.1, 2d01h, FastEthernet0/0
D 10.1.193.5/32 [90/41024000] via 10.1.194.6, 2d01h, Serial0/0/0.122

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 6
Collecte et filtrage d’informations en utilisant
les commandes IOS SHOW
Using pipes with include, exclude and begin

R1# show processes cpu | include IP Input


71 3149172 7922812 397 0.24% 0.15% 0.05% 0 IP Input

S1# show ip interface brief | exclude unassigned


Interface IP-Address OK? Method Status Protocol
Vlan128 10.1.156.1 YES NVRAM up up

S1# show running-config | begin line vty


line vty 0 4
transport input telnet ssh
line vty 5 15
transport input telnet ssh
!
End

R1# show processes cpu| include IP Input


^
% Invalid input detected at '^' marker.

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 7
Collecte et filtrage d’informations en utilisant
les commandes IOS SHOW
Using pipes with section and ^

R1# show running-config | section router eigrp


router eigrp 1
network 10.1.192.2 0.0.0.0
network 10.1.192.10 0.0.0.0
network 10.1.193.1 0.0.0.0
no auto-summary

R1# show processes cpu | include ^CPU|IP Input


CPU utilization for five seconds: 1%/0%; one minute: 1%; five minutes: 1%
71 3149424 7923898 397 0.24% 0.04% 0.00% 0 IP Input

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 8
Collecte et filtrage d’informations en utilisant
les commandes IOS SHOW
Using the redirect and tee options

R1# show tech-support | redirect tftp://192.168.37.2/show-tech.txt

R1# show ip interface brief | tee flash:show-int-brief.txt


Interface IP-Address OK? Method Status
Protocol
FastEthernet0/0 10.1.192.2 YES manual up up
FastEthernet0/1 10.1.192.10 YES manual up up
Loopback0 10.1.220.1 YES manual up up

R1# dir flash:


Directory of flash:/
1 -rw- 23361156 Mar 2 2009 16:25:54 -08:00 c1841-advipservicesk9mz.1243.bin
2 -rw- 680 Mar 7 2010 02:16:56 -08:00 show-int-brief.txt

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 9
Collecte et filtrage d’informations en utilisant
les commandes IOS SHOW
Using the append option and the more command

R1# show version | append flash:show-commands.txt

R1# show ip interface brief | append flash:show-commands.txt

R1# more flash:show-commands.txt


Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(23),
RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2008 by Cisco Systems, Inc.
Compiled Sat 08-Nov-08 20:07 by prod_rel_team
ROM: System Bootstrap, Version 12.3(8r)T9, RELEASE SOFTWARE (fc1)
R1 uptime is 3 days, 1 hour, 22 minutes
< output omitted >
Interface IP-Address OK? Method Status
Protocol
FastEthernet0/0 10.1.192.2 YES manual up up
FastEthernet0/1 10.1.192.10 YES manual up up

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 10
Tests de connectivité à l’aide de Cisco IOS
commandes réseau
Router#
ping ip-address | hostname [repeat repeat-count size
datagram-size source [address | interface] df-bit]

Parameter Description

repeat repeat- Number of ping packets that are sent to the destination
count address. The default is 5.
size datagram-size Size of the ping packet (in bytes). Default: 100 bytes.

source [address | The interface or IP address of the router to use as a


interface] source address for the probes.
df-bit Enables the "do-not-fragment" bit in the IP header.

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 11
Tests de connectivité à l’aide de Cisco IOS
commandes réseau
Using the ping extended option: source

R1# ping 10.1.156.1


Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.156.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms

R1# ping 10.1.156.1 source FastEthernet 0/0


Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.156.1, timeout is 2 seconds:
Packet sent with a source address of 10.1.192.2
.....
Success rate is 0 percent (0/5)

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 12
Tests de connectivité à l’aide de Cisco IOS
commandes réseau
Using the ping extended option: df-bit

R1# ping 10.1.221.1 size 1476 df-bit


Type escape sequence to abort.
Sending 5, 1476-byte ICMP Echos to 10.1.221.1, timeout is 2 seconds:
Packet sent with the DF bit set
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 184/189/193 ms

R1# ping 10.1.221.1 size 1477 df-bit


Type escape sequence to abort.
Sending 5, 1477-byte ICMP Echos to 10.1.221.1, timeout is 2 seconds:
Packet sent with the DF bit set
M.M.M
Success rate is 0 percent (0/5)

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 13
Tests de connectivité à l’aide de Cisco IOS
commandes réseau

Explanation of ping results characters


▪! Each exclamation point indicates receipt of a reply.
▪. Each period indicates a timeout waiting for a reply.
▪U A destination unreachable ICMP message was received.
▪ Q Source quench (destination too busy).
▪M Could not fragment (MTU related).
▪? Unknown packet type.
▪& Packet lifetime exceeded

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 14
Tests de connectivité à l’aide de Cisco IOS
commandes réseau
Using the ping extended prompt mode

R1# ping
Protocol [ip]:
Target IP address: 10.1.221.1
Repeat count [5]: 1
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface:
Type of service [0]:
Set DF bit in IP header? [no]: yes
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]: y
Sweep min size [36]: 1400
Sweep max size [18024]: 1500
Sweep interval [1]:
Type escape sequence to abort.
Sending 101, [1400..1500]-byte ICMP Echos to 10.1.221.1, timeout is 2 seconds:
<output omitted>

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 15
Tests de connectivité à l’aide de Cisco IOS
commandes réseau
Using Telnet to test the Transport and Application Layer

R1# telnet 192.168.37.2 80


Trying 192.168.37.2, 80 ... Open
GET
<html><body><h1>It works!</h1></body></html>
[Connection to 192.168.37.2 closed by foreign host]

R1# telnet 192.168.37.2 25


Trying 192.168.37.2, 25 ...
% Connection refused by remote host

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 16
Collecte en temps réel d’informations à l’aide
de Cisco IOS déboguer commandes
The debug ip packet command output

R1# debug ip packet


IP: s=172.69.13.44 (Fddi0), d=10.125.254.1 (Serial2), g=172.69.16.2,
forward
IP: s=172.69.1.57 (Ethernet4), d=10.36.125.2 (Serial2),
g=172.69.16.2, forward
IP: s=172.69.1.6 (Ethernet4), d=255.255.255.255, rcvd 2
IP: s=172.69.1.55 (Ethernet4), d=172.69.2.42 (Fddi0), g=172.69.13.6,
forward
IP: s=172.69.89.33 (Ethernet2), d=10.130.2.156 (Serial2),
g=172.69.16.2, forward
IP: s=172.69.1.27 (Ethernet4), d=172.69.43.126 (Fddi1),
g=172.69.23.5, forward
IP: s=172.69.1.27 (Ethernet4), d=172.69.43.126 (Fddi0),
g=172.69.13.6, forward
IP: s=172.69.20.32 (Ethernet2), d=255.255.255.255, rcvd 2
IP: s=172.69.1.57 (Ethernet4), d=10.36.125.2 (Serial2),
g=172.69.16.2, access denied

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 17
Collecte en temps réel d’informations à l’aide
de Cisco IOS déboguer commandes
The debug ip rip command output

R1# debug ip rip


RIP: received v2 update from 10.1.1.2 on Serial0/0/0
30.0.0.0/8 via 0.0.0.0 in 1 hops
RIP: sending v2 update to 224.0.0.9 via FastEthernet0/0 (20.1.1.1)
RIP: build update entries
10.0.0.0/8 via 0.0.0.0, metric 1, tag 0
30.0.0.0/8 via 0.0.0.0, metric 2, tag 0
RIP: sending v2 update to 224.0.0.9 via Serial0/0/0 (10.1.1.1)
RIP: build update entries
20.0.0.0/8 via 0.0.0.0, metric 1, tag 0
RIP: received v2 update from 10.1.1.2 on Serial0/0/0
30.0.0.0/8 via 0.0.0.0 in 1 hops
RIP: sending v2 update to 224.0.0.9 via FastEthernet0/0 (20.1.1.1)

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 18
Collecte en temps réel d’informations à l’aide
de Cisco IOS déboguer commandes
Using the debug condition command

R2# debug ip rip


RIP: received v2 update from 10.0.23.3 on FastEthernet0/1
10.0.3.0/24 via 0.0.0.0 in 1 hops
RIP: received v2 update from 10.0.12.1 on FastEthernet0/0
10.0.1.0/24 via 0.0.0.0 in 1 hops
RIP: sending v2 update to 224.0.0.9 via FastEthernet0/1 (10.0.23.2)
<output omitted>

R2# debug condition interface fa0/1


Condition 1 set
RIP: sending v2 update to 224.0.0.9 via FastEthernet0/1 (10.0.23.2)
RIP: build update entries
10.0.1.0/24 via 0.0.0.0, metric 2, tag 0
10.0.2.0/24 via 0.0.0.0, metric 1, tag 0
10.0.12.0/24 via 0.0.0.0, metric 1, tag 0
RIP: received v2 update from 10.0.23.3 on FastEthernet0/1
10.0.3.0/24 via 0.0.0.0 in 1 hops
<output omitted>

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 19
Diagnostic des problèmes de matériel à l’aide
de commandes IOS Cisco
Checking CPU utilization with show processes cpu

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 20
Diagnostic des problèmes de matériel à l’aide
de commandes IOS Cisco
Checking memory utilization with the show memory
command
R1# show memory
Head Total(b) Used(b) Free(b) Lowest(b) Largest(b)
Processor 820B1DB4 26534476 19686964 6847512 6288260 6712884
I/O 3A00000 6291456 3702900 2588556 2511168 2577468

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 21
Diagnostic des problèmes de matériel à l’aide
de commandes IOS Cisco
Checking interfaces with the show interfaces command

R1# show interfaces FastEthernet 0/0


FastEthernet0/0 is up, line protocol is up
<output omitted>
Last input 00:00:00, output 00:00:01, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/1120/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 2000 bits/sec, 3 packets/sec
5 minute output rate 0 bits/sec, 1 packets/sec
110834589 packets input, 1698341767 bytes
Received 61734527 broadcasts, 0 runts, 0 giants, 565 throttles
30 input errors, 5 CRC, 1 frame, 0 overrun, 25 ignored
0 watchdog
0 input packets with dribble condition detected
35616938 packets output, 526385834 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 22
Diagnostic des problèmes de matériel à l’aide
de commandes IOS Cisco
Additional hardware commands and tools:
▪ show controllers
▪ show platform
▪ show inventory
▪ show diag
▪ Generic Online Diagnostics (GOLD)
▪ Time Domain Reflectometer

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 23
Maintenance et
Dépannage à l’aide
des outils spécials

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 24
Outils de capture de trafic
Sample screen shot from a protocol analyzer: Wireshark

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 25
Outils de capture de trafic
Switched Port Analyzer (SPAN)

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 26
Outils de capture de trafic
Remote Switched Port Analyzer (RSPAN)

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 27
Outils de capture de trafic
Remote Switched Port Analyzer (RSPAN) – Cont.

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 28
Recueillir des informations avec SNMP

Exemple: Simple Configuration de SNMP

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 29
Recueillir des informations avec NetFlow
Exemple: Simple Configuration de NetFlow

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 30
Recueillir des informations avec NetFlow
show ip cache flow command output

R1# show ip cache flow


<output omitted>
SrcIf SrcIPaddress DstIF DstIPaddress Pr SrcP DstP Pkts
Se0/0/0.121 10.1.194.10 Null 224.0.0.10 58 0000 0000 27
Se0/0/0.121 10.1.194.14 Null 224.0.0.10 58 0000 0000 28
Fa0/0 10.1.192.5 Null 224.0.0.10 58 0000 0000 28
Fa0/1 10.1.192.13 Null 224.0.0.10 58 0000 0000 27
Fa0/1 10.1.152.1 Local 10.1.220.2 01 0000 0303 1
Se0/0/1 10.1.193.6 Null 224.0.0.10 58 0000 0000 28
Fa0/1 10.1.152.1 Se0/0/1 10.1.163.193 11 0666 E75E 1906
Se0/0/1 10.1.163.193 Fa0/0 10.1.152.1 11 E75E 0666 1905

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 31
SNMP vs NetFlow Comparison

SNMP NetFlow
Statistiques sur les routeurs et switchs ✓ ✓
Collections des statistiques variées sur les composants du réseau ✓
Collections seulement les statistiques du trafic IP sur les ✓
composants du réseau
Utilise le modèle « PUSH »: les composants envoient les ✓
données au collecteur
Utilise le modèle « PULL »: NMS envoie des requêtes pour ✓
récupérer les données sur les composants
Peut permettre de collecter aussi des indicateurs de performance ✓
comme: erreurs sur les interfaces, Usage CPU, Usage de la
mémoire…
Les statistiques collectées contiennent beaucoup de granularité ✓
Cisco IOS routers but only the 4500 and 6500 series switches ✓
Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 32
Activation de Notification d’événement réseau

▪ Notification des pannes en est un élément clé


d’une stratégie de gestion proactive du réseau.
▪ SNMP & syslog - deux protocoles populaires
qui sont utilisés aux fins de la notification
d’événement.
▪ Embedded Event Manager (EEM) - Cisco IOS
fonctionnalité qui fournit une méthode avancée
pour créer des événements personnalisés et
définir les actions à entreprendre en réponse à
ces événements.
Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 33
Activation de Notification d’événement réseau
– SNMP
Enabling SNMP trap notification

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 34
Activation de Notification d’événement réseau –
Embedded Event Manager (EEM)
▪ Enables custom policies that trigger actions based on
events:
• syslog messages
• Cisco IOS counter changes
• SNMP MIB object changes
• SNMP traps
• CLI command execution
• Timers and many other options
▪ Actions can consist of:
• Sending SNMP traps or syslog messages
• Executing CLI commands
• Sending email
• Running Tool Command Language (TCL) scripts

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 35
Activation de Notification d’événement réseau
– EEM
A sample EEM Configuration

R1(config)# event manager applet CONFIG-STARTED

R1(config-applet)# event cli pattern "configure terminal" sync no skip no occurs


1

R1(config-applet)# action 1.0 syslog priority critical msg "Configuration mode


was entered"

R1(config-applet)# action 2.0 syslog priority informational msg "Change control


policies apply. Authorized access only."

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 36
Activation de Notification d’événement réseau
– EEM
A sample EEM policy result

R1# conf t
Enter configuration commands, one per line. End with CNTL/Z.

R1(config)#
Jul 13 03:24:41.473 PDT: %HA_EM-2-LOG: CONFIG-STARTED: Configuration mode was
entered
Jul 13 03:24:41.473 PDT: %HA_EM-6-LOG: CONFIG-STARTED: Change control policies
apply. Authorized access only

For more information, visit http://cisco.com/go/instrumentation

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 37
Chapter 3 Summary
▪ Filtering using Cisco IOS commands can be accomplished by:
• Specifying an IP address as an option with the show ip route command.
• Specifying a prefix as an option with the show ip route command followed by the
longer-prefixes keyword.
• Appending a pipe operator “|” to the show command followed by one of the keywords
include, exclude, or begin and then a regular expression.
• Selecting specific portions of the configuration output with any associated lines. For
example, the command show running-config | section router.
▪ Command output can be redirected, copied or appended to a file by
using the pipe operator “|” and the following options:
• The redirect option - Output will not be displayed on the screen, but redirected to a
text file that can be stored locally in flash memory or on a TFTP or FTP server.
• The tee option - Displays output on the screen and copies it to a text file.
• The append option – Similar to the redirect option, but allows appending output to a file
instead of replacing that file.

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 38
Chapter 3 Summary – Cont.
▪ Ping is an excellent connectivity-testing tool, especially
when used with its options such as repeat, size,
source, and df-bit. If you type ping with no IP address
and press Enter, the extended ping dialog allows you to
choose more options such as sweep sizes.
▪ Telnet allows Transport Layer and partial Application Layer
testing using a session to any TCP port of an IP device. If
the port is active you will get a response such as “Open”. A
“no” response or refusal indicates that either the port is not
active on the target IP device or that security features don’t
allow you to connect to that port.

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 39
Chapter 3 Summary – Cont.
▪ Cisco IOS Software includes commands to diagnose hardware operation.
Commands that are common to both routers and switches are:
• show processes cpu
• show memory
• show interfaces
▪ Other commands that can be useful in troubleshooting hardware related
problems are:
• show controllers
• show platform
• show inventory
• show diag
▪ Some features that can be used to diagnose interface hardware or cabling
issues are:
• Generic Online Diagnostics (GOLD)
• Time Domain Reflectometer (TDR)

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 40
Chapter 3 Summary – Cont.
▪ Examples of network monitoring and event reporting tools are:
• Logging system messages to syslog
• Event notification using SNMP
• Event notification using the Embedded Event Manager (EEM)
▪ Examples of incident related information gathering tools are SPAN and
RSPAN (used for traffic capturing).
▪ Examples of baseline creation and traffic accounting tools are:
• Statistics gathering using SNMP
• Traffic accounting using NetFlow
▪ Packet sniffers can be used to capture packets in order to allow detailed
analysis of packet flows. Taking packet captures at various points in the
network allows you to spot potential differences.
▪ Two main technologies that can be used to create a baseline of network
usage and performance are SNMP and NetFlow.

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 41
Chapter 3 Labs
▪ Lab 3-1 Assembling Maintenance and Troubleshooting
Tools

Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 42
Chapter #
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 43

You might also like